Item Search

NameAudit NamePluginCategory
2 - Specify file handler in jetty-logging.properties files - org.eclipse.jetty.util.log.class=org.eclipse.jetty.util.log.StrErrLogTNS Best Practice Jetty 9 LinuxUnix

AUDIT AND ACCOUNTABILITY

4 - Restrict access to $JETTY_HOME - modeTNS Best Practice Jetty 9 LinuxUnix

ACCESS CONTROL

6 - EncryptionTNS Best Practice Jetty 9 LinuxUnix

SYSTEM AND COMMUNICATIONS PROTECTION

20 - Restrict access to server.xml - modeTNS Best Practice Jetty 9 LinuxUnix

ACCESS CONTROL

21 - Restrict access to users.xml - ownerTNS Best Practice Jetty 9 LinuxUnix

ACCESS CONTROL

24 - Remove extraneous files and directories - $JETTY_BASE/webapps/balancerTNS Best Practice Jetty 9 LinuxUnix

CONFIGURATION MANAGEMENT

31 - Starting with Security ManagerTNS Best Practice Jetty 9 LinuxUnix

SYSTEM AND COMMUNICATIONS PROTECTION

33 - Disable deploy on startup of applicationsTNS Best Practice Jetty 9 LinuxUnix

CONFIGURATION MANAGEMENT

Buffer overflow protection should be configured 'LimitRequestFields'TNS IBM HTTP Server Best PracticeWindows

SYSTEM AND COMMUNICATIONS PROTECTION

Buffer overflow protection should be configured 'LimitRequestline'TNS IBM HTTP Server Best PracticeWindows

SYSTEM AND COMMUNICATIONS PROTECTION

CGI-BIN directory should be disabled. 'Directory'TNS IBM HTTP Server Best PracticeUnix

CONFIGURATION MANAGEMENT

CGI-BIN directory should be disabled. 'LoadModule cgi_module'TNS IBM HTTP Server Best PracticeUnix

CONFIGURATION MANAGEMENT

Configuration files should be secured against unauthorized access.TNS IBM HTTP Server Best PracticeUnix
Extreme : Configure Banner before-loginTNS Extreme ExtremeXOS Best Practice AuditExtreme_ExtremeXOS

ACCESS CONTROL

Extreme : Password Policy - max-age <= 90TNS Extreme ExtremeXOS Best Practice AuditExtreme_ExtremeXOS

IDENTIFICATION AND AUTHENTICATION

Extreme : Review admin accountsTNS Extreme ExtremeXOS Best Practice AuditExtreme_ExtremeXOS

ACCESS CONTROL

Extreme : SNMP community name != publicTNS Extreme ExtremeXOS Best Practice AuditExtreme_ExtremeXOS

IDENTIFICATION AND AUTHENTICATION

Fortigate - Disable auto USB installation - 'image'TNS Fortigate FortiOS Best Practices v2.0.0FortiGate

CONFIGURATION MANAGEMENT

Fortigate - Enable logs of failed connection attemptsTNS Fortigate FortiOS Best Practices v2.0.0FortiGate

AUDIT AND ACCOUNTABILITY

Fortigate - Encrypt logs sent to FortiAnalyzer/FortiManagerTNS Fortigate FortiOS Best Practices v2.0.0FortiGate

SYSTEM AND COMMUNICATIONS PROTECTION

Fortigate - Ensure default admin usernames are not usedTNS Fortigate FortiOS Best Practices v2.0.0FortiGate

ACCESS CONTROL

Fortigate - Inactivity timeout - 'console' <= 300TNS Fortigate FortiOS Best Practices v2.0.0FortiGate

ACCESS CONTROL

Fortigate - Local Logging is enabledTNS Fortigate FortiOS Best Practices v2.0.0FortiGate

AUDIT AND ACCOUNTABILITY

Fortigate - Login Banner - pre-login-bannerTNS Fortigate FortiOS Best Practices v2.0.0FortiGate

ACCESS CONTROL

Fortigate - Password Complexity - 1 uppercase letterTNS Fortigate FortiOS Best Practices v2.0.0FortiGate

IDENTIFICATION AND AUTHENTICATION

Fortigate - Password Complexity - at least 1 charTNS Fortigate FortiOS Best Practices v2.0.0FortiGate

IDENTIFICATION AND AUTHENTICATION

Fortigate - SNMP community string - 'private'TNS Fortigate FortiOS Best Practices v2.0.0FortiGate

IDENTIFICATION AND AUTHENTICATION

Fortigate - SNMP community string - 'public'TNS Fortigate FortiOS Best Practices v2.0.0FortiGate

IDENTIFICATION AND AUTHENTICATION

Fortigate - SNMP v3 uses SHA instead of MD5TNS Fortigate FortiOS Best Practices v2.0.0FortiGate

SYSTEM AND COMMUNICATIONS PROTECTION

Fortigate - System event loggingTNS Fortigate FortiOS Best Practices v2.0.0FortiGate

AUDIT AND ACCOUNTABILITY

Fortigate - VPN event loggingTNS Fortigate FortiOS Best Practices v2.0.0FortiGate

AUDIT AND ACCOUNTABILITY

HTTP TRACE method should be disabled. 'RewriteCond'TNS IBM HTTP Server Best PracticeWindows

CONFIGURATION MANAGEMENT

HTTP TRACE method should be disabled. 'TraceEnable'TNS IBM HTTP Server Best PracticeUnix

CONFIGURATION MANAGEMENT

Huawei: Configure appropriate External Syslog serverTNS Huawei VRP Best Practice AuditHuawei

AUDIT AND ACCOUNTABILITY

Huawei: Disable Telnet on IPV6TNS Huawei VRP Best Practice AuditHuawei

CONFIGURATION MANAGEMENT

Huawei: Enable AAA accountingTNS Huawei VRP Best Practice AuditHuawei

IDENTIFICATION AND AUTHENTICATION

Huawei: HTTPS Server requires SSL policyTNS Huawei VRP Best Practice AuditHuawei

SYSTEM AND COMMUNICATIONS PROTECTION

Huawei: User Interfaces Idle Timeout Less Than 5 MinutesTNS Huawei VRP Best Practice AuditHuawei

ACCESS CONTROL

Latest Patches/Fixes should be installedTNS IBM HTTP Server Best PracticeWindows

SYSTEM AND INFORMATION INTEGRITY

Limit HTTP methods allowed by the Web Server.TNS IBM HTTP Server Best PracticeWindows

CONFIGURATION MANAGEMENT

Limit HTTP methods allowed by the Web Server.TNS IBM HTTP Server Best PracticeUnix

CONFIGURATION MANAGEMENT

Logging Directives should be restricted to authorized users. - 'CustomLog logs/access_log combined'TNS IBM HTTP Server Best PracticeWindows

AUDIT AND ACCOUNTABILITY

Logging Directives should be restricted to authorized users. - 'LogFormat'TNS IBM HTTP Server Best PracticeWindows

AUDIT AND ACCOUNTABILITY

Logging Directives should be restricted to authorized users. - 'LogLevel notice'TNS IBM HTTP Server Best PracticeUnix

AUDIT AND ACCOUNTABILITY

MaxKeepAliveRequests parameter value should be appropriately configured.TNS IBM HTTP Server Best PracticeWindows

SYSTEM AND COMMUNICATIONS PROTECTION

MaxSpareServers parameter value should be appropriately configured.TNS IBM HTTP Server Best PracticeUnix

SYSTEM AND COMMUNICATIONS PROTECTION

MinSpareServers parameter value should be appropriately configured.TNS IBM HTTP Server Best PracticeWindows

SYSTEM AND COMMUNICATIONS PROTECTION

MinSpareServers parameter value should be appropriately configured.TNS IBM HTTP Server Best PracticeUnix

SYSTEM AND COMMUNICATIONS PROTECTION

Non-Essential modules should be disabled. 'mod_status'TNS IBM HTTP Server Best PracticeWindows

CONFIGURATION MANAGEMENT

Timeout value parameter value should be appropriately configuredTNS IBM HTTP Server Best PracticeWindows

ACCESS CONTROL